PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Rozproszone systemy teleinformatyczne: Inteligencja, autonomia, racjonalność i bezpieczeństwo kooperacji

Autorzy
Identyfikatory
Warianty tytułu
EN
Distributed Computer Communication Systems: Intelligence, Autonomy, Rationality and Cooperation Security
Konferencja
Krajowe Sympozjum Telekomunikacji i Teleinformatyki (XXIX ; 2013 ; Gdańsk, Polska)
Języki publikacji
PL
Abstrakty
PL
Wzrostowi inteligencji i autonomii podmiotów komunikacji systemów teleinformatycznych towarzyszy rozszerzanie paradygmatu analizy i projektowania w stronę podmiotów indywidualnie racjonalnych (egoistycznych). Wymaga to zastosowania metod teorii gier niekooperatywnych. Pokazano przykłady zachowań egoistycznych określonych jako „wymuszanie pierwszeństwa” i „fałszywe tablice” odpowiednio w środowisku wireless multihoming oraz lokalnej sieci bezprzewodowej IEEE 802.11 z algorytmem EDCA. Scharakteryzowano ich wpływ na wynikowe punkty pracy i opisano mechanizmy obronne.
EN
The growing intelligence and autonomy built in the communicating parties within a computer communication system cause the contemporary design and analysis paradigm to account for individually rational (selfish) parties. This calls for application of the methods of noncooperative game theory. In the paper, examples of selfish behavior dubbed as "forcing the right of way" and "phony plates" are shown, respectively in a wireless multihoming environment and an IEEE 802.11 WLAN with QoS differentiation. Their impact upon the outcome of the underlying games is discussed and defense mechanisms are described.
Rocznik
Tom
Strony
625--632
Opis fizyczny
Bibliogr. 48 poz., rys., tab.
Twórcy
autor
  • Wydział Elektroniki, Telekomunikacji i Informatyki, Politechnika Gdańska
Bibliografia
  • [1] Satyanarayanan M.: Lowering the barriers to large-scale mobile crowd-sensing. Proc. ACM HotMobile'13, New York NY, 2013
  • [2] Fudenberg D. and Tirole J.: Game Theory. MIT Press, 1991
  • [3] Shenker S.: Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines, IEEE/ACM Trans. Networking, 3,1995
  • [4] Koutsoupias E. and Papadimitriou C. H.: Worst-case equilibria, Proc. 16th Annual Symp. Theoretical Aspects of Computer Science, Trier, Germany, March 1999, LNCS vol. 1563, Springer-Verlag 1999
  • [5] Konorski J.: A Game-theoretic study of CSMAJCA under a backoff attack, IEEE/ACM Trans. Networking, vol. 14, Dec. 2006
  • [6] IEEE Computer Society, IEEE Std. 802.11-2012, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2012
  • [7] MacKenzie A. B. and Wicker S. B.: Game theory and the design of self-configuring, adaptive wireless networks, IEEE Comm. Magazine, vol 39, 2001
  • [8] Cagalj M. et al.: On selfish behavior in CSMA/CA networks, Proc. INFOCOM 2005, Miami, FL, 2005
  • [9] Chen L. and Leneutre J.: Selfishness, Not Always a Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks, Proc. 27th ICDCS, Toronto, 2007
  • [10] Konorski J.: Multihomed Wireless Terminals: MAC Configuration and Network Selection Games, Proc. 25th International Conf. on Information Networking, Kuala Lumpur, Malaysia, January 2011, IEEE Xplore DOI: 10.1109/ICOIN.2011.57231832011 (Best Paper Award)
  • [11] Konorski J. and Szott S : EDCA Remapping in Ad Hoc IEEE 802.11 WLANs: An Incentive Compatible Discouragement Scheme, Proc. IFIP Wireless Days, Dublin, Ireland, Nov. 2012, IEEE Xplore DOI: 10.1109/WD.2012.6402868
  • [12] Konorski J.: Equilibria of a wireless multihoming game, Proc. 2nd Int. IEEE Conf. on Information Technology, Gdansk, Poland, June 2010
  • [13] Ylitalo J. et al.: Dynamic network interface selection in multihomed mobile hosts, Proc. 36th Hawaii Int. Conf. on System Sciences, 2003
  • [14] Yu W.: Competition and cooperation in multi-user communication environments. Ph.D. dissert., Stanford University, Stanford, CA, 2002
  • [15] Athanasiou G. et al.: Dynamic cross-layer association in 802.11-based mesh networks, Proc. INFOCOM 2007, Anchorage, Alaska, 2007
  • [16] Stevens-Navarro E., Lin Y., and Wong V.: An MDP-based vertical handoff decision algorithm for heterogeneous wireless network, IEEE Trans. Veh. Technology, vol. 57, March 2008
  • [17] Kauffmann B. et al.: Self Organization of Interfering 802.11 Wireless Access Networks, INRIA Technical Report, August 2005
  • [18] Xia L., Ungge J., Chen H., and Hong-wei L.: An intelligent vertical handoff algorithm in heterogeneous wireless networks, Proc. Int. Conf. on Neural Networks and Signal Processing, June 2008
  • [19] Ormond O. et al.: Utility-Based Intelligent Network Selection in Beyond 3G Systems, Proc. IEEE ICC 2006, Istanbul, Turkey, June 2006
  • [20] Shakkottai S. et al.: Multihoming of users to access points in WLANs: A population game perspective, IEEE J. Selected Areas in Communications, vol. 25, No. 6, August 2007
  • [21] Mertikopoulos P. and Moustakas A. L: Correlated anarchy in overlapping wireless networks, IEEE J. Selected Areas in Communications, Vol. 26, no. 7, August 2008
  • [22] Konorski J Ad hoc multi-WLAN: a game-theoretic model of correlated play, Proc. IFIP Wireless Days 2009, Paris, Dec. 2009
  • [23] Niyato D. and Hossain E.: Dynamics of network selection in heterogeneous wireless networks: An evolutionary game approach IEEE Trans. Veh. Technology, vol. 58, May 2009
  • [24] Konorski J. and Siwecki A.: Wireless Network Selection: A Population Dynamics Approach, Proc. 1st European Teletraffic Symposium ETS 2011, Poznan, Poland, 14-15 Feb 2011
  • [25] Bianchi G : Performance analysis of the IEEE 802. 11 Distributed Coordination Function, IEEE J Selected Areas Commun., vol SAC-18, March 2000
  • [26] Neel O'Daniell J. : Analysis and design of cognitive radio networks and distributed radio resource management algorithms, Ph. D. dissert, Virginia Polytechnic Institute and State Univ., Blacksburg VA, 2006
  • [27] Bianchi G., Di Stefano A., Giaconia C., Scalia L., Terrazzino G. and Tinnirello I.: Experimental assessment of the backoff behavior ot commercial IEEE 802.11b network cards, Proc IEEE INFOCOM, 2007
  • [28] Serrano P., Banchs A., and Kukielka J. F.: Detection of malicious parameter configurations in 802.11e EDCA, Proc IEEE GLOBECOM, 2005
  • [29] Szott S., Natkaniec M., and Canonico R.: Detecting backoff misbehaviour in IEEE 802.11 EDCA, European Trans, on Telecommun., vol 22, 2011
  • [30] Kyasanur P. and Vaidya N.H.: Selfish MAC layer misbehavior in wireless networks, IEEE Trans. Mobile Computing, vol. 4, 2005
  • [31] Guang L., Assi C., and Benslimane A.: MAC layer misbehavior in wireless networks: challenges and solutions IEEE Wireless Communications, vol. 15, 2008
  • [32] Galluccio L.: A game-theoretic approach to prioritized transmission in wireless CSMAJCA networks, Proc. IEEE 69th Vehicular Technology Conference, Barcelona, Spain, 2009
  • [33] Konorski J. and Szott S.: A game-theoretic approach to EDCA Remapping attacks, Proc. 8th WiCOM, Shanghai, PRC, Sept. 2012, IEEE Xplore DOI: 10.1109/WiCOM.2012. 6478287
  • [34] Akkarajitsakul K., Hossain E., Niyato D., and Dong In Kim: Game theoretic approaches for multiple access in wireless networks: a survey. IEEE Comm. Surveys & Tutorials, vol. 13, no. 3, 2011
  • [35] Hu J., Min G., Jia W., and Woodward M.E. : Admission control in IEEE 802.11e Wireless LAN: a game-theoretical approach, in: Y. Zhang and M. Guizani (eds.), Game Theory for Wireless Communications and Networking. CRC Press, 2011
  • [36] Cheung M. H., Mohsenian-Rad A. H., Wong V. W. S., and Schober R.: Random access protocols for WLANs based on mechanism design, Proc. IEEE ICC 2009, Dresden, Germany, June 2009
  • [37] Nguyen S. H., Andrew L. L. H., and Vu H. L.: Service differentiation without prioritization in IEEE 802.11 WLANs, Proc. IEEE Conf. on Local Computer Networks, 2011
  • [38] Zhao L., Cong L., Zhang H., Ding W., and Zhang J.: Game-theoretic EDCA in IEEE 802.11e WLANs, Proc. IEEE VTC, 2008
  • [39] Li M. and Prabhakaran B.: MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperativewireless LANs, J. Mobile Networks and Applications, vol. 10, 2005
  • [40] Nuggehalli P., Sarkar M., and Rao R.: QoS and selfish users: A MAC-layer perspective, Proc. IEEE GLOBECOM 2007
  • [41] ITU-T Recommendation Y.1541: Network performance objectives for IP-based services, 2011
  • [42] ns-2, The Network Simulator, http://www.isi.edu/ nsnam/ns/
  • [43] Wiethoelter S., Emmelmann M., Hoene C., and Wolisz A.: TKN EDCA model for ns-2, Technical report, Telecomm. Networks Group, Technische University of Berlin, 2006
  • [44] Rasmusen E.: Games and Information: An Introduction to Game Theory. Blackwell Publishers, 2001
  • [45] Szott S., Natkaniec M., and Pach A. R.: An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes, J. Wireless Comm. and Networking, 2010
  • [46] Ross S. and Chaib-draa B.: Satisfaction equilibrium: achieving cooperation in incomplete information games, Lecture Notes in Computer Science, vol. 4013, Springer-Verlag 2006
  • [47] Rubinstein A.: Modeling Bounded Rationality. MIT Press, 1998
  • [48] Friedman E. J. and Shenker S.: Synchronous and asynchronous learning by responsive learning automata. Mimeo 1996
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-63af2fbf-60ee-4063-92f3-606f6a61a034
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.